Static task
static1
Behavioral task
behavioral1
Sample
c6d30c953a3921e686dfdce64dc416fd8c9299e9026bf34cbf0667e324daa4ff.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c6d30c953a3921e686dfdce64dc416fd8c9299e9026bf34cbf0667e324daa4ff.exe
Resource
win10v2004-20220901-en
General
-
Target
c6d30c953a3921e686dfdce64dc416fd8c9299e9026bf34cbf0667e324daa4ff
-
Size
278KB
-
MD5
dad3c20ab3a91a2df70623428a92a790
-
SHA1
fad8aace8dd87e6c18dae5a18e481c329f9e3757
-
SHA256
c6d30c953a3921e686dfdce64dc416fd8c9299e9026bf34cbf0667e324daa4ff
-
SHA512
eca13479c374e117f0eaa5072fc7526263d1b999adc1f30d3b3499b6145c9121b49ea6b148af964b1005e95651a44aa2da4064b4e147ca0f84b32c0d1e8da00b
-
SSDEEP
6144:yUtogqkuh/VVVDsBMdhWfas8yAhSE16MmRqTHe4zfNWB8nDnWR:yUGbkupVgBukf4yArRHe4TNWJ
Malware Config
Signatures
Files
-
c6d30c953a3921e686dfdce64dc416fd8c9299e9026bf34cbf0667e324daa4ff.exe windows x86
7d14052ddfff7059a8870559881d8768
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineA
CompareStringW
IsValidLocale
InterlockedIncrement
RtlUnwind
GetStringTypeA
GetShortPathNameW
GetCurrentProcess
GetModuleFileNameW
VirtualAlloc
LeaveCriticalSection
IsBadWritePtr
HeapReAlloc
GetFileType
TryEnterCriticalSection
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
GetModuleFileNameA
GetCPInfo
GetStdHandle
ExitProcess
GetCurrentThread
GetStartupInfoW
GetTimeFormatA
LoadLibraryA
GetTickCount
GetSystemTimeAsFileTime
GetOEMCP
FreeEnvironmentStringsA
HeapCreate
QueryPerformanceCounter
VirtualFree
SetLastError
SetConsoleCursorPosition
SetHandleCount
TlsSetValue
EnumSystemLocalesA
HeapAlloc
GetLocaleInfoA
HeapFree
GetNamedPipeHandleStateW
MultiByteToWideChar
GetCurrentProcessId
WriteFile
GetStringTypeW
GetStartupInfoA
TlsFree
GetVersionExA
EnterCriticalSection
GetDateFormatA
GetSystemInfo
GetACP
InitializeCriticalSection
TlsAlloc
HeapValidate
CreateSemaphoreA
GetModuleHandleA
LocalFree
WideCharToMultiByte
EnumTimeFormatsA
GetTimeZoneInformation
SetEnvironmentVariableA
CreateMailslotW
GetCurrencyFormatW
DeleteCriticalSection
GetUserDefaultLCID
GetProcAddress
GetEnvironmentStrings
GetLastError
CompareStringA
IsValidCodePage
InterlockedExchange
HeapDestroy
VirtualProtect
GetLocaleInfoW
VirtualQuery
UnhandledExceptionFilter
TlsGetValue
GlobalReAlloc
LCMapStringA
GetCurrentThreadId
HeapSize
FileTimeToSystemTime
TerminateProcess
GetCommandLineW
comdlg32
ReplaceTextA
GetFileTitleA
user32
RemoveMenu
IsCharLowerA
GetDlgItemTextW
GetWindowLongA
DdeReconnect
ExcludeUpdateRgn
DrawCaption
ModifyMenuW
GetAncestor
SendIMEMessageExW
AppendMenuW
ToAscii
ArrangeIconicWindows
RegisterClassW
CreateMDIWindowW
MonitorFromWindow
GetProcessDefaultLayout
CheckDlgButton
GetClipboardViewer
SetWindowLongW
OemToCharA
SendInput
DrawTextA
Sections
.text Size: 160KB - Virtual size: 160KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ